Adaptively secure, splittable, and robust threshold unsigncryption

Abstract As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various applications such as cloud computing, blo...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuxin Tong, Shimin Li, Zhiwei Wang, Rui Zhang, Rui Xue
Format: Article
Language:English
Published: SpringerOpen 2025-05-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-024-00344-3
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850190746200571904
author Yuxin Tong
Shimin Li
Zhiwei Wang
Rui Zhang
Rui Xue
author_facet Yuxin Tong
Shimin Li
Zhiwei Wang
Rui Zhang
Rui Xue
author_sort Yuxin Tong
collection DOAJ
description Abstract As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various applications such as cloud computing, blockchain, and electronic auctions. However, existing schemes only consider security under a limited static corruption model, where the adversary selects which parties to corrupt before the protocol begins. As a result, these schemes lack the flexibility to address more complex attack forms posed by real-world adversaries. To solve this issue, it is worth investigating threshold unsigncryption schemes with adaptive security. In this paper, we propose the first provably secure (t, n) threshold unsigncryption scheme in the standard model against adaptive corruption adversaries who can corrupt parties at any time during protocol execution. The main contributions include: First, we provide the formal syntactic definition and security model of threshold unsigncryption schemes under the adaptive corruption model. Second, we employ the dual system technique to formally prove that the proposed scheme can achieve adaptive security in the standard model. Notably, our scheme is equipped with valuable properties such as non-interactivity, robustness, public verifiability, and splittable unsigncryption, significantly enhancing usability and functional completeness. Besides, we implement the proposed scheme on two types of elliptic curve groups with different security levels and evaluate its practical performance under different thresholds. Experiments demonstrate that on a composite order group with 80-bit security, a single receiver only takes 16.61 s to perform the threshold unsigncryption phase when the number of receivers n is 20 and the threshold t reaches up to 18. As a pioneering adaptively secure threshold unsigncryption scheme, our work not only establishes a benchmark for future proposals but also broadens its application in scenarios requiring high-security levels and flexible key management, such as electronic voting.
format Article
id doaj-art-8e744c0c9a6740b7939cd19a46b182a6
institution OA Journals
issn 2523-3246
language English
publishDate 2025-05-01
publisher SpringerOpen
record_format Article
series Cybersecurity
spelling doaj-art-8e744c0c9a6740b7939cd19a46b182a62025-08-20T02:15:11ZengSpringerOpenCybersecurity2523-32462025-05-018112410.1186/s42400-024-00344-3Adaptively secure, splittable, and robust threshold unsigncryptionYuxin Tong0Shimin Li1Zhiwei Wang2Rui Zhang3Rui Xue4Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesCETC Cyberspace Security Technology Co., Ltd.Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesKey Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesKey Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesAbstract As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various applications such as cloud computing, blockchain, and electronic auctions. However, existing schemes only consider security under a limited static corruption model, where the adversary selects which parties to corrupt before the protocol begins. As a result, these schemes lack the flexibility to address more complex attack forms posed by real-world adversaries. To solve this issue, it is worth investigating threshold unsigncryption schemes with adaptive security. In this paper, we propose the first provably secure (t, n) threshold unsigncryption scheme in the standard model against adaptive corruption adversaries who can corrupt parties at any time during protocol execution. The main contributions include: First, we provide the formal syntactic definition and security model of threshold unsigncryption schemes under the adaptive corruption model. Second, we employ the dual system technique to formally prove that the proposed scheme can achieve adaptive security in the standard model. Notably, our scheme is equipped with valuable properties such as non-interactivity, robustness, public verifiability, and splittable unsigncryption, significantly enhancing usability and functional completeness. Besides, we implement the proposed scheme on two types of elliptic curve groups with different security levels and evaluate its practical performance under different thresholds. Experiments demonstrate that on a composite order group with 80-bit security, a single receiver only takes 16.61 s to perform the threshold unsigncryption phase when the number of receivers n is 20 and the threshold t reaches up to 18. As a pioneering adaptively secure threshold unsigncryption scheme, our work not only establishes a benchmark for future proposals but also broadens its application in scenarios requiring high-security levels and flexible key management, such as electronic voting.https://doi.org/10.1186/s42400-024-00344-3Threshold unsigncryptionAdaptive securitySplittable unsigncryption
spellingShingle Yuxin Tong
Shimin Li
Zhiwei Wang
Rui Zhang
Rui Xue
Adaptively secure, splittable, and robust threshold unsigncryption
Cybersecurity
Threshold unsigncryption
Adaptive security
Splittable unsigncryption
title Adaptively secure, splittable, and robust threshold unsigncryption
title_full Adaptively secure, splittable, and robust threshold unsigncryption
title_fullStr Adaptively secure, splittable, and robust threshold unsigncryption
title_full_unstemmed Adaptively secure, splittable, and robust threshold unsigncryption
title_short Adaptively secure, splittable, and robust threshold unsigncryption
title_sort adaptively secure splittable and robust threshold unsigncryption
topic Threshold unsigncryption
Adaptive security
Splittable unsigncryption
url https://doi.org/10.1186/s42400-024-00344-3
work_keys_str_mv AT yuxintong adaptivelysecuresplittableandrobustthresholdunsigncryption
AT shiminli adaptivelysecuresplittableandrobustthresholdunsigncryption
AT zhiweiwang adaptivelysecuresplittableandrobustthresholdunsigncryption
AT ruizhang adaptivelysecuresplittableandrobustthresholdunsigncryption
AT ruixue adaptivelysecuresplittableandrobustthresholdunsigncryption